US20080281733A1 - System and method for authorizing electronic payment transactions - Google Patents

System and method for authorizing electronic payment transactions Download PDF

Info

Publication number
US20080281733A1
US20080281733A1 US12/174,228 US17422808A US2008281733A1 US 20080281733 A1 US20080281733 A1 US 20080281733A1 US 17422808 A US17422808 A US 17422808A US 2008281733 A1 US2008281733 A1 US 2008281733A1
Authority
US
United States
Prior art keywords
transaction
authorization
based
frequency distribution
relation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US12/174,228
Other versions
US7896234B2 (en
Inventor
Takayuki Kubo
Norbert Albrecht
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
First Data Corp
Original Assignee
First Data Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to EP05012141.7 priority Critical
Priority to EP05012141 priority
Priority to EP20050012141 priority patent/EP1732034A1/en
Priority to US11/428,487 priority patent/US7413119B2/en
Priority to US12/174,228 priority patent/US7896234B2/en
Application filed by First Data Corp filed Critical First Data Corp
Assigned to FIRST DATA CORPORATION reassignment FIRST DATA CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ALBRECHT, NORBERT, KUBO, TAKAYUKI
Publication of US20080281733A1 publication Critical patent/US20080281733A1/en
Assigned to WELLS FARGO BANK, NATIONAL ASSOCIATION, AS COLLATERAL AGENT reassignment WELLS FARGO BANK, NATIONAL ASSOCIATION, AS COLLATERAL AGENT SECURITY AGREEMENT Assignors: DW HOLDINGS, INC., FIRST DATA RESOURCES, INC. (K/N/A FIRST DATA RESOURCES, LLC), FUNDSXPRESS FINANCIAL NETWORKS, INC., INTELLIGENT RESULTS, INC. (K/N/A FIRST DATA SOLUTIONS, INC.), LINKPOINT INTERNATIONAL, INC., MONEY NETWORK FINANCIAL, LLC, SIZE TECHNOLOGIES, INC., TASQ TECHNOLOGY, INC., TELECHECK INTERNATIONAL, INC.
Assigned to WELLS FARGO BANK, NATIONAL ASSOCIATION, AS COLLATERAL AGENT reassignment WELLS FARGO BANK, NATIONAL ASSOCIATION, AS COLLATERAL AGENT SECURITY AGREEMENT Assignors: DW HOLDINGS, INC., FIRST DATA RESOURCES, LLC, FIRST DATA SOLUTIONS, INC., FUNDSXPRESS FINANCIAL NETWORKS, INC., LINKPOINT INTERNATIONAL, INC., MONEY NETWORK FINANCIAL, LLC, SIZE TECHNOLOGIES, INC., TASQ TECHNOLOGY, INC., TELECHECK INTERNATIONAL, INC
Application granted granted Critical
Publication of US7896234B2 publication Critical patent/US7896234B2/en
Assigned to WELLS FARGO BANK, NATIONAL ASSOCIATION, AS COLLATERAL AGENT reassignment WELLS FARGO BANK, NATIONAL ASSOCIATION, AS COLLATERAL AGENT SECURITY AGREEMENT Assignors: FIRST DATA CORPORATION
Assigned to CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH reassignment CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH SECURITY AGREEMENT Assignors: CLOVER NETWORKS, INC., FIRST DATA CORPORATION, MONEY NETWORK FINANCIAL, LLC
Assigned to Clover Network, Inc., FIRST DATA CORPORATION, MONEY NETWORK FINANCIAL, LLC reassignment Clover Network, Inc. RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH
Application status is Active legal-status Critical
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/12Accounting

Abstract

A transaction authorization system comprises an authorization engine (18) configured to perform an analysis in relation to a received request for authorization of a current electronic payment transaction and generate an authorization output based on the analysis, and a database (22) storing a plurality of transaction records for past electronic payment transactions. The authorization engine is configured to:
  • access the database to determine one or more distribution functions based on at least some of the stored transaction records,
  • determine one or more intermediate values in relation to the received authorization request based on the one or more distribution functions,
  • determine a conditional probability in relation to the one or more intermediate values based on at least some of the stored transaction records, the conditional probability indicative of a probability of a predetermined transaction result under the condition of the one or more intermediate values, and
  • generate the authorization output based on the determined conditional probability.

Description

  • The present invention relates to a system and method for authorizing electronic payment transactions.
  • As used herein, the term “payment transaction” is to be understood as referring to an action or set of actions having as its goal the electronic transfer of money or other values from a payor's account to a payee's account. “Electronic transaction” means a transaction that is conducted, in whole or in part, by electronic means or electronic records. The transaction may be conducted using wireless and/or wired communications technology. For example, the Internet, a public switched telephone network, a wide area network, a local area network, a virtual private network, and other types of communications networks and/or links may be utilized for performing an electronic payment transaction.
  • Electronic payment transactions frequently require authorization by a designated entity prior to execution of the transaction. The authorization entity may perform some form of analysis related to the requested transaction and, depending on the result of the analysis, render a decision whether to decline or authorize the payment transaction. The quality of the analysis is determinative of the error rate of the decision. That is, the better the analysis, the smaller the number of transactions that were erroneously approved and also the smaller the number of transactions that were erroneously declined.
  • Erroneous decisions by a payment transaction authorization entity may give rise to increased signal traffic and data processing. For example, erroneous approval of a payment transaction request may result in reversal of the authorized transaction after execution thereof. Reverse transactions stemming from erroneous authorizations cause additional signal traffic and consume additional processing time and resources in the communications and data processing infrastructure used for processing the electronic payment transactions. In view of the finite computing and routing capacity of existing computer network systems, there is a high desire to keep unnecessary signal traffic and data processing caused by erroneous decisions of a payment transaction authorization entity low.
  • It is therefore an object of the present invention to provide a transaction authorization system and method which allow to achieve improved decision reliability to thereby prevent increased load on existing computing and network resources.
  • To achieve the above object, the present invention provides a transaction authorization system, comprising:
      • an authorization engine configured to perform an analysis in relation to a received request for authorization of a current electronic payment transaction and generate an authorization output based on the analysis,
      • a database storing a plurality of transaction records for past electronic payment transactions,
        wherein the authorization engine is configured to:
      • access the database to determine one or more distribution functions based on at least some of the stored transaction records,
      • determine one or more intermediate values in relation to the received authorization request based on the one or more distribution functions,
      • determine a conditional probability in relation to the one or more intermediate values based on at least some of the stored transaction records, the conditional probability indicative of a probability of a predetermined transaction result under the condition of the one or more intermediate values, and
      • generate the authorization output based on the determined conditional probability.
  • The present invention also provides a transaction authorization method, comprising:
      • receiving a request for authorization of a current electronic payment transaction,
      • providing a database storing a plurality of transaction records for past electronic payment transactions,
      • accessing the database to determine one or more distribution functions based on at least some of the stored transaction records,
      • determining one or more intermediate values in relation to the received authorization request based on the one or more distribution functions,
      • determining a conditional probability in relation to the one or more intermediate values based on at least some of the stored transaction records, the conditional probability indicative of a probability of a predetermined transaction result under the condition of the one or more intermediate values, and
      • generating an authorization output based on the determined conditional probability.
  • The term “engine” as used herein refers to a mechanism implemented by suitable hardware and/or software and designed to perform one or more predefined processes.
  • In one embodiment of the present invention, the electronic payment transactions are card-initiated transactions where “card” refers to a card-shaped means of making electronic payments. Debit cards and credit cards are conventionally known examples of payment cards. The payment card may include, in computer-readable form, information identifying an account of the card holder. This information may be stored, e.g., in a magnetic strip provided on the card or a chip integrated into the card. Card terminals located at merchant sites may be configured to read the identification information from customer's payment cards.
  • Various payment methods have been devised and implemented on the basis of machine-readable payment cards. Among them, a signature-based electronic debit payment method and an identification code-based electronic debit payment method have attained widespread acceptance by market participants.
  • In identification code-based debit payment, the card holder enters a personal identification number (PIN) into a keypad or keyboard of a card terminal. In an online version of the PIN payment method, the PIN number is transmitted via an online connection to an electronic authorization center of the card issuing bank along with such information as an account identifier identifying the card holder's account and the amount due. The bank's authorization center checks the PIN number and also whether the account has sufficient funds to collect the requested amount. If the card is valid and sufficient funds are available, the authorization center effects payment, and an “ok” message is sent to the terminal. Otherwise, the authorization center declines payment. There is also known an offline version of PIN-based debit payment where the PIN number is checked by the card at the point of sale (POS) and may be checked, alternatively or additionally, by the authorization center of the card issuing bank at a later time not correlated with the time of input of the PIN by the card holder.
  • In signature-based debit payment, no PIN is entered by the card holder to confirm the payment. Instead, the card holder provides a signature on a receipt printed by the terminal. The terminal reads the card holder's account data from the card's magnetic strip or chip and stores the read information along with the amount due in a payment data set. This data set may thereafter be forwarded to the issuing bank of the debit card to collect the amount due from the card holder's account.
  • The above signature-based debit payment method may be enhanced by an online authorization check. To this end, the terminal sends a request message including the account data read from the debit card to an authorization entity which checks whether the requested transaction can be authorized. The authorization entity may hold a list of stolen or otherwise prohibited debit cards for which no payment approval must be allowed. Typically, the authorization entity has no access to account information of the card holders and thus has no knowledge as to whether or not a specific requestor's account holds sufficient funds. The authorization entity may be implemented on a remote computer system communicably coupled to the terminal via a wide area network, the Internet or a public telecommunications network, for example. Alternately, the authorization entity may be coupled to the terminal through a local are network, which may, e.g., be a proprietary computer network of a merchant.
  • A person versed in the art will readily understand that the above identification code-based and signature-based debit payment methods are not limited to a card shape of the payment means, but can be used in connection with a machine-readable payment means of any shape and size. The present invention is therefore not to be understood as being limited to payment cards, but envisages the use of differently shaped and sized, machine-readable payment means.
  • Moreover, while the transaction authorization system and method of the present invention are preferably intended for use in authorizing requests for signature-based debit payment transactions, a person of ordinary skill in the art will appreciate that the transaction authorization system and method of the present invention may also be useful in connection with other types of payment transactions, which may, or may not, rely on portable, machine-readable payment means. For example, there is known a cardless debit payment method in which a payor uses a graphical user interface displayed on a display device of a computer terminal to enter his or her account information and, possibly, additional data and confirms the payment electronically by clicking on a button or providing a digital signature. An electronic payment transaction occurring as part of such a cardless payment method may represent another embodiment of a payment transaction that can be authorized by the system and method of the present invention. It is further to be noted that the present invention may find application also with respect to payment methods other than debit payment methods. For example, it is conceivable to use the present invention for the authorization of cheque-based payment transactions.
  • An authorization system responsible for authorizing electronic payment transactions may have no, or no immediate, access to account information of a payor in the transaction. Decisions of the authorization system are then subject to uncertainty and may prove erroneous. For example, it may occur that an authorization system for signature-based debit payment transactions or other “PIN-less” payment transactions grants a payment request not knowing that the payor's account lacks sufficient funds. In such a case, a reverse transaction may follow in order to re-collect a balance that may have already been credited to the payee's account. It has been found that such reverse transactions may cause considerable signal traffic and consume considerable computing power in existing payment transaction processing infrastructure, which signal traffic and computing power could be saved and is otherwise utilized if a more reliable authorization decision was available. Here, “authorization decision” generally refers to the decision output by the authorization system, whether positive, negative or anything between.
  • To achieve a more reliable authorization decision, the authorization engine in the transaction authorization system of the present invention may access a database that contains a history log of electronic payment transactions to derive information on a characteristic pattern or patterns that can be found in past transactions recorded in the database.
  • In one embodiment, the database may only contain transaction records that all stem from payment transactions of a same type. In this case, the authorization engine will determine one or more distribution functions only on the basis of past payment transactions of one type. For example, a signature-based debit payment transaction can be viewed as one type of payment transaction, an identification code-based debit payment transaction can be viewed as another type of payment transaction, and a cheque-based payment transaction can be viewed as yet another type of payment transaction.
  • In an alternate embodiment, the database may contain transaction records for payment transactions of two or more different types. In such a case, the authorization engine may determine the distribution functions on the basis of past payment transactions of a selected single type only or may use transaction records relating to different types of payment transactions. As an example, the authorization engine may determine the distribution functions based on transaction records for signature-based debit payment transactions and transaction records for identification code-based debit payment transactions.
  • Each transaction record in the database will include a plurality of data fields that may contain various transaction-related information. One or more of the data fields may serve to indicate an outcome of the transaction such as if the transaction was authorized or rejected and/or if it could be completed successfully and/or if it was annulled through a reverse transaction. Other data fields may serve to contain such transaction parameters as a payor account identifier, a transaction time, a transaction date, a transaction amount, location information, an identification code of a terminal used for initiating the transaction, etc.
  • The one or more distribution functions determined by the authorization engine may be indicative of the frequency or probability distribution of such transaction attributes as the transaction amount, the transaction time, the transaction date, a difference between the times or dates of two successive transactions for the same payor account, the geographical location of a terminal from which a transaction authorization request was received, and an identification code of such a terminal. The authorization engine may determine one or more distribution functions for each of a plurality of payor accounts individually, and may also determine one or more distribution functions for one or more groups of payor accounts. As a mere example, the authorization engine may determine individual transaction amount frequency distribution functions for numerous payor accounts, which individual transaction amount frequency distribution functions indicate the (absolute or relative) frequency distribution of the transaction amount in past payment transactions for each individual of the payor accounts. Additionally, the authorization engine may determine an average transaction amount frequency distribution function indicating the frequency distribution of the transaction amount in past payment transactions for all of the payor accounts collectively, i.e., when taken as a group.
  • Based on distribution functions such as above, the authorization engine determines one or more intermediate values in relation to the received authorization request. The intermediate values preferably include at least one current transaction probability, which is determined by the authorization engine by identifying one or more transaction attributes associated with the received authorization request and determining a probability for each transaction attribute on the basis of an individual frequency distribution function determined for that transaction attribute for the same payor account as identified in the received authorization request.
  • The intermediate values preferably further include at least one relative entropy, which is determined by the authorization engine on the basis of an individual frequency distribution function for one or more transaction attributes associated with the received authorization request and an average frequency distribution function for each transaction attribute. The relative entropy can, e.g., be determined according to the so-called Kullback-Leibler divergence, which is a measure for the dissimilarity of two distributions over the same random variable.
  • The authorization engine uses the intermediate values to determine a conditional probability that indicates a probability of a predetermined transaction result under the condition of the intermediate values. The conditional probability is derived by the authorization engine based on the content of the database. Specifically, the authorization engine performs a statistical evaluation on a set of transaction records stored in the database to determine what was the probability in the past for the predetermined transaction result to occur, given the same or substantially the same intermediate values as a condition. The set of transaction records included in the statistics may comprise the entire number of records stored in the database or a selected sub-set therefrom. For example, the authorization engine may use transaction records from only a predetermined most recent period of time when determining the conditional probability. Alternately, the authorization engine may use a predetermined number of most recent transaction records only.
  • The predetermined transaction result may be successful completion or failure of the transaction. Accordingly, the conditional probability determined as above represents a score for the likelihood of success or failure of the requested transaction, which score is obtained by comparing the requested current transaction with a characteristic pattern or patterns observed in past transactions. It has been found that the use and evaluation of history data for authorizing currently requested payment transactions in the above manner can greatly improve the reliability of the authorization decision and consequently reduce overall signal traffic related to payment processing.
  • The authorization system of the present invention may comprise a host server configured to receive authorization requests for first-type payment transactions and second-type payment transactions, forward the authorization requests for first-type payment transactions to the authorization engine, and route the authorization requests for second-type payment transactions to a remote further transaction authorization system. The host server is coupled to the database and is configured to register a transaction record for every requested first-type payment transaction and every requested second-type payment transaction in the database.
  • A computer-readable information storage medium in accordance with the present invention includes stored program code means adapted to effect, when executed by a computer system, execution of the methodology discussed above. The information so storage medium may, e.g., be in the form of an optical or magnetic disk storing the program code means. The program code means can also be available in the form of a signal transmitted in a communications system. The signal may be an electric or electromagnetic signal transmitted through wired or wireless media and representing a sequence of instructions forming the program code means.
  • The invention will be explained further by way of non-limiting and purely illustrative example in conjunction with the accompanying drawings, in which:
  • FIG. 1 illustrates a schematic block diagram of a portion of an exemplary architecture for processing electronic card payment transactions;
  • FIG. 2 shows an exemplary individual frequency distribution function illustrating a frequency distribution for the transaction attribute ‘transaction time’ obtained from a plurality of fictitious payment transactions for an individual payor account, and
  • FIG. 3 shows an exemplary average frequency distribution function illustrating a frequency distribution for the transaction attribute ‘transaction time’ obtained from a plurality of fictitious payment transactions for a group of payor accounts.
  • In FIG. 1, a plurality of card terminals 10 are depicted, which are configured to read stored information from a payment card such as schematically indicated at 12. The terminals 10 may be located at the site of one or more merchants. In a debit payment method, the read information may include account data consisting of an account number of the holder of the card and a bank identification code. The terminals 10 are communicably coupled to a host server 14 across a communications network 16. The host server 14 is communicably coupled to a first authorization engine 18 and one or more second, remotely located authorization engines 20.
  • The communications network 16 may include, e.g., at least one of a land-line public switched telephone network, a mobile communications network such as according to the GMS or UTMS standard or any other conventionally known mobile communications standard, the Internet, a proprietary communications network, a wide area network, etc.
  • The first authorization engine 18 is destined to check incoming authorization requests for first-type payment transactions, whereas the one or more second authorization engines 20 are destined to check incoming authorization requests for second-type payment transactions. Such first-type and second-type payment transactions represent alternative ways of transferring a payment amount. The following is description specifically envisages a scenario where signature-based debit card payment transactions are first-type payment transactions and PIN-based debit card payment transactions are second-type payment transactions. In such a scenario, the first authorization engine 18 may have no access to account information of debit card holders, while the one or more second authorization engines 20 have access to such account information, enabling them to determine whether a requested payment amount can be collected from a card holder's account.
  • One or more of the card terminals 10 may be configured to support signature-based debit card payment transactions only. One or more other card terminals 10 may be configured to support PIN-based debit card payment transactions only. Some of the card terminals 10 may be configured to support both signature-based debit card payment transactions and PIN-based debit card payment transactions.
  • In a signature-based debit card payment method with online authorization, a terminal 10 reads account data from a debit card and establishes a communication connection with the host server 14. The terminal transmits an authorization request message to the host server 14 via the communication connection. Included in the authorization request message are the account data read from the debit card and possibly further information. The host server 14 receives the authorization request message and forwards it to the first authorization engine 18. The first authorization engine 18 checks the authorization request online and returns a response message, which is transmitted via the host server 14 to the requesting terminal 10. The response message includes an authorization decision based on the result of the analysis performed by the first authorization engine 18.
  • After receipt of the response message from the first authorization engine 18, the terminal 10 or host server 14 may transmit a debit data set including all relevant transaction data to a bank's payment processing system to settle the outstanding debt. In case of insufficient funds on the card holder's account, the card issuing bank may electronically decline to debit the balance due to the card holder's account. This may result in the merchant's bank annulling a credit it may already have posted on so the merchant's account. It will be easily appreciated by one of ordinary skill in the art that the signal traffic involved in such a reverse transaction could be avoided if the authorization decision from the first authorization engine 18 was more reliable.
  • In a PIN-based debit card payment method, a terminal 10 similarly transmits an is authorization request message to the host server 14. The authorization request message additionally includes a PIN input by the card holder at the terminal. The host server 14 is programmed to route the message to the second authorization engine 20 (or, if plural second authorization engines 20 are provided, an appropriate one of the plural systems). The second authorization engine 20 checks the PIN and also whether the card holder has sufficient funds in his or her account. It returns a response message, which is transmitted via the host server 14 to the requesting terminal. The response message contains information as to whether or not the requested transaction is approved or rejected. Such information may be in the form of an answer code, the value of which indicates the decision of the second authorization engine 20.
  • A database 22 is shown in FIG. 1 which stores a history log of at least some of the debit card payment transactions that are processed via the host server 14. The transactions recorded in the database 22 preferably include both PIN-based payment transactions and signature-based payment transactions. The database 22 may be maintained by the host server 14, which may update the database 22 whenever it receives an authorization request message for a new PIN-based or signature-based debit card payment transaction.
  • The history log in the database 22 comprises a transaction record for each registered payment transaction. Each transaction record includes a plurality of transaction parameters related to the respective payment transaction. These parameters may include the transaction time, transaction date and transaction amount, a merchant type (category) code, a merchant country code, a location of the requesting terminal, a terminal identification code, etc. Each terminal 10 has its own unique terminal identification code, which it transmits as part of a transaction authorization request whenever a payment transaction is initiated from the terminal.
  • Each transaction record further includes account information of a payor in the respective transaction. This account information may be comprised of the card holder's account number, a bank identification code, and possibly further data. Moreover, each transaction record includes a data field which serves to receive information on whether or not the respective transaction was successful or was rejected or annulled. In the case of PIN-based transactions, this data field may indicate the answer code returned by the second authorization engine 20. In the case of signature-based transactions, it may indicate if the transaction was approved or rejected by the first authorization engine 18 and—in case of approval—if the is transaction was later annulled by a reverse transaction. Information on such reverse transactions may, e.g., be forwarded to the host server 14 from a bank's transaction processing system (not shown in the FIG. 1) involved in processing (and possibly reversing) the respective signature-based transaction.
  • The database 22 is accessible to the first authorization engine 18. One of the functionalities of the first authorization engine 18 is to perform a statistical evaluation on part or all of the data stored in the database 22. To this end, the first authorization engine 18 is designed to carry out a process of performing such statistics. Based on the statistics, the first authorization engine 18 may determine a score for a requested signature-based payment transaction, wherein the score indicates a likelihood of failure or successful completion of the requested transaction.
  • The statistics performed by the first authorization engine 18 include the determination of individual frequency distribution functions F{PAN, Ai nj} for various transaction attributes for each of a plurality of payor accounts. In the above expression, F represents the transaction frequency, PAN represents the payor account, Ai represents the transaction attribute, and nj represents a value or range of values (bin) of the transaction attribute Ai. F{PAN, Ai, nj} thus indicates the number of transactions for a given payor account PAN where the value of the transaction attribute Ai belongs to the “bin” nj. Assuming a number L of different transaction attributes for which the first authorization engine 18 determines respective frequency distribution functions, the index i satisfies 1≦i≦L. Further, assuming a number N of different bins or ranges into which the value of the attribute Ai may fall, the index j satisfies 1≦j≦N.
  • In a preferred embodiment, the first authorization engine 18 determines individual frequency distribution functions for one or more of the following transaction attributes: transaction amount, transaction time, transaction date, difference between the transaction time of two successive transactions for the same payor account, difference between the transaction date of two successive transactions for the same payor account, and terminal identification code.
  • In order to determine the individual frequency distribution functions, the first authorization engine 18 searches the database 22 for transaction records for a specific payor account. Valid transaction records may be required to have been registered within a predetermined most recent period of time or be among a predetermined number of most recent records. Such requirements, however, are merely optional, and valid transaction records may be taken from the entire set of records recorded in the database 22.
  • Based on the transactions records found, the first authorization engine 18 analyses them to determine the distribution of each transaction attribute of interest among the records. An exemplary (fictitious) individual frequency distribution function for the transaction attribute ‘transaction time’ is illustrated in FIG. 2. This figure indicates a higher transaction frequency during nighttime than during daytime, revealing that the holder of the payment card has a tendency to make payments at night.
  • The first authorization engine 18 further determines at least one average frequency distribution function Fav{Ai, nj}=Σ{PAN, Ai, nj} for each transaction attribute of interest. The average frequency distribution function represents the frequency distribution of the respective transaction attribute in transactions for a group of payor accounts. The group may include all payor accounts for which transactions are recorded in the database 22. Alternately, the group may be defined by one or more predetermined selection criteria. One selection criterion may relate to geographical location. For example, the first authorization engine 18 may determine an average frequency distribution function for a specific transaction attribute for all payor accounts held with banks in a specific country. The account information included in the transaction records may indicate the particular country. Alternatively or additionally, the first authorization engine 18 may determine an average frequency distribution function for a specific transaction attribute for all payor accounts found in a set of registered transactions that occurred in a specific country. The merchant country code in the transaction records may serve as indicator in which country a transaction occurred. Another selection criterion may relate to the merchant category. Using such a selection criterion, the first authorization engine 18 may determine an average frequency distribution function for a specific transaction attribute for all payor accounts found in a set of recorded transactions that relate to a specific category of merchant.
  • In the above manner, the first authorization engine 18 can determine one or more to average frequency distribution functions (depending on the applicable group selection criteria) in relation to each transaction attribute of interest. FIG. 3 illustrates an exemplary (fictitious) average frequency distribution function for the transaction attribute ‘transaction time’. One can see that this function shows a higher transaction frequency during daytime than during nighttime. In other words, more payment transactions were effected during the day than at night in the selected set of registered transactions based on which the function of FIG. 3 was determined.
  • The first authorization engine 18 may re-determine the individual and average frequency distribution functions at regular time intervals or whenever a predetermined number of transactions have been newly recorded in the database 22. It can store the distribution functions thus determined in suitable memory (not illustrated in FIG. 1).
  • The first authorization engine 18 is further designed to analyze a current authorization request for a signature-based payment transaction and determine the value of one or more transaction attributes of the requested transaction. Preferably, the first authorization engine 18 determines the value of one or more of the following transaction attributes: requested transaction amount, time of the current transaction, date of the current transaction, transaction time difference between the current transaction and an immediately previous transaction for the same payor account, transaction date difference between the current transaction and the immediately previous transaction for the same payor account, and identification code of the terminal 10 from which the current authorization request was transmitted. The transaction amount will be indicated in the received authorization request, as will be the terminal identification code. The time and date of the current transaction may also be indicated in the received authorization request or may be determined by the host server 14 or the first authorization engine 18 using an internal clock or time reference. The time and date of an immediately previous transaction for the same payor account as indicated in the received authorization request can be determined by the first authorization engine 18 by searching the database 22 for a most recent transaction record of that payor account.
  • Based on the thus determined attribute values for the requested current transaction and further based on the individual frequency distribution functions determined as above, the first authorization engine 18 is designed to determine a probability P{PAN, Ai} in relation to each transaction attribute of interest for the payor account indicated in the received authorization request according to the following formula:

  • P{PAN, A i }=F{PAN, A i , n*}/Σ j F{PAN, A i ,n j}
  • where n* represents a bin into which the value of the transaction attribute Ai of the requested current transaction falls. P{PAN, Ai} thus represents a probability for the is transaction attribute Ai to have a value falling into bin n* in a payment transaction for a specific payor account, given the individual frequency distribution function F{PAN, Ai, nj} for that transaction attribute for the same payor account. In other words, the probability P{PAN, Ai} is a measure for the match between the transaction attribute Ai of the requested current transaction and the past pattern for that transaction attribute. The greater the value of P{PAN, Ai}, the better does the transaction attribute Ai of the requested current transaction match the past pattern. Conversely, the smaller the value of P{PAN, Ai}, the less does the transaction attribute Ai of the requested current transaction match the past pattern.
  • Furthermore, based on the individual and average frequency distribution functions, the first authorization engine 18 determines a relative entropy H{PAN, Ai} in relation to each transaction attribute of interest for the payor account indicated in the received authorization request the according to following formula:

  • H{PAN, A i}=Σj F{PAN, A i , n j}×log[F{PAN, A i , n j }/F av {A i , n j}]
  • The above relative entropy H{PAN, Ai} i a measure for the dissimilarity between the payor account's individual frequency distribution function F{PAN, Ai, nj} for the transaction attribute Ai and the average frequency distribution function Fav{Ai, nj} for that transaction attribute. It corresponds to what is referred to as Kullback-Leibler divergence in the art of information theory. A person of ordinary skill in the art will readily appreciate that any other entropy measure for the similarity between the payor account's individual frequency distribution function F{PAN, Ai, nj} and the average frequency distribution function Fav{Ai, nj} can be used.
  • The first authorization engine 18 thus determines two intermediate values in relation to each transaction attribute of interest, one indicating a probability for the specific value of the transaction attribute in the requested current transaction to occur in view of the same payor account's past pattern (i.e., P{PAN, Ai}) and another indicating the degree of match between the past pattern of the specific payor account indicated in the authorization request and an average past pattern of a group of payor accounts for the same transaction attribute (i.e., H{PAN, Ai}). In a preferred embodiment, more than one transaction attribute will be considered by the first authorization engine 18. Accordingly, the number of intermediate values to be determined by the first authorization engine 18 will be greater than two. For example, the transaction amount, time and date, the terminal identification code and is the time and date differences between two successive transactions for the same payor account may all be considered as relevant transaction attributes by the first authorization engine 18. In this case, the first authorization engine 18 determines twelve intermediate values in relation to an incoming transaction authorization request.
  • One will understand that the number two of intermediate values to be determined by the first authorization engine 18 in relation to each transaction attribute of interest is a mere example and not intended to be limiting to the present invention. In a simple embodiment, it may suffice for the first authorization engine 18 to determine individual frequency distribution functions and, based thereon, a current probability in relation to each transaction attribute of interest. In such as case, only one intermediate value will result in relation to each transaction attribute of interest. In other embodiments, additional measures may have to be determined by the first authorization engine 18 in response to an incoming transaction authorization request so that the number of intermediate values to be determined for each transaction attribute of interest may be three or more.
  • The first authorization engine 18 not only determines, and updates, the individual and average frequency distribution functions, but further determines at least one conditional probability distribution P{TR|P[A1], P[A2], . . . , P[A], H[A1], H[A2], . . . , H[Ai]} based on at least some of the transaction records in the database 22. In the above expression, TR represents a predetermined transaction result such as failure or successful completion, P[Ai] represents a probability for the occurrence of a specific value of the transaction attribute Ai and H[Ai] represents a relative entropy related to the transaction attribute Ai. The expression P{TR|P[A1], P[A2], . . . , P[Ai], H[A1], H[A2], . . . , H[Ai]} thus represents the conditional probability for the occurrence of the predetermined transaction result under the condition that the probability and entropy parameters P[A1], P[A2], . . . , P[Ai], H[A1], H[A2], . . . , H[Ai] assume certain values. In simple words, the conditional probability distribution P{TR|P[A1], P[A2], . . . , P[Ai], H[A1], H[A2], . . . , H[Ai]} indicates what was in the past the probability of a positive or negative outcome of a transaction when the current probabilities for specific values of the transaction attributes A1, A2, . . . , Ai were P[A1], P[A2], . . . , P[Ai] and when the current relative entropies associated with these transaction attributes had the values H[A1], H[A2], . . . , H[Ai].
  • In one embodiment, the first authorization engine 18 determines conditional probability distributions in relation to individual ones of the payor accounts that appear in the transaction records in the database 22. In this case, the conditional probability distribution indicates what was in the past the probability of a positive or negative outcome of a transaction for a specific payor account when the current probabilities for specific values of the transaction attributes A1, A2, . . . , Ai were P[Ai], P[A2], . . . , P[Ai] for that payor account (based on individual frequency distribution functions determined for that payor account) and when the current relative entropies associated with these transaction attributes had the values H[A1], H[A2], . . . , H[Ai] for that payor account (based on individual and average frequency distribution functions determined for that payor account).
  • In another embodiment, the first authorization engine 18 may determine one or more global conditional probability distributions in relation to respective groups of payor accounts. In that case, the conditional probability distribution indicates what was in the past the probability of a positive or negative outcome of a transaction in a group of payor accounts when the current probabilities for specific values of the transaction attributes A1, A2, . . . , Ai were P[A1], P[A2], . . . , P[Ai] in that group and when the current relative entropies associated with these transaction attributes had the values H[A1], H[A2], . . . , H[Ai] in that group.
  • The conditional probability distributions can be determined by the first authorization engine 18 in different ways. One, although potentially consuming much computational power, is exact calculation, which is based on counting the number of occurrences of various attribute values and transaction outcomes in the records in the database 22. Other ways, which may be computationally more feasible, resort to methods of predictive modeling and may employ Naive Bayes networks or neural networks, which are generally known to those skilled in the art.
  • Each conditional probability distribution can be determined by the first authorization engine 18 in the form of a multi-dimensional table (matrix) including a plurality of conditional probabilities. The first authorization engine 18 stores each conditional probability distribution in suitable memory and may re-determine it statically at regular, predetermined time intervals or dynamically whenever a predetermined number of new transactions (any new transactions or only transactions for a specific payor account or a specific group of payor accounts) has been registered in the database 22.
  • It has been indicated further above that the first authorization engine 18 determines a score for a requested signature-based payment transaction. In order to determine such score, the first authorization engine 18 accesses an appropriate one of the conditional probability distributions to determine a conditional probability corresponding to the intermediate values it determined in relation to the received authorization request. The conditional probability thus determined represents a likelihood that the requested signature-based transaction will fail or will be successfully completed. In one embodiment, the first authorization engine 18 may generate its authorization decision solely based on the determined conditional probability. To this end, it may compare the conditional probability with one or more predetermined threshold values and reject or approve the requested transaction depending on whether the conditional probability is below or above the threshold. The threshold value(s) may be adjustably set in the first authorization engine 18. There may be defined different threshold values for different merchant types, countries, payor accounts, etc.
  • In an alternate embodiment, the conditional probability determined in the above manner for the received authorization request may form a partial score value, which is combined with one or more other partial score values by the first authorization engine 18 in order to determine an authorization decision. The other partial score values may result from other checking procedures which the first authorization engine 18 may apply with regard to the requested transaction. One such other checking procedure may involve a comparison of the payor account indicated in the received authorization request with a stored negative list of prohibited accounts and/or a positive list of eligible lists to thereby determine whether the payor account identified in the request is blocked, e.g., due to fraudulent use of a payment card in the past. A partial score value resulting from such a check may thus indicate whether or not the payor account to which the authorization request is directed is prohibited or eligible.
  • The first authorization engine 18 may combine the various partial score values in a weighted manner as follows:

  • v=a 1 v 1 +a 2 v 2 + . . . a n v n
  • to wherein v1 represents a first partial score value, ai represents a weight given to the first partial score value, v2 represents the second partial score value, a2 represents a weight given to the second partial score value, vn represents a n-th partial score value and an represents a weight given to the n-th partial score value. The total value v thus obtained may then be returned by the first authorization engine 18 as an authorization result to the requesting terminal 10. Alternately, the first authorization engine 18 may perform a threshold comparison by comparing the total value v with one or more predetermined threshold values and return a “yes” or “no” decision as the authorization result based on the threshold comparison. Again, the threshold value(s) may be adjustably set in the first authorization engine 18 and there may be defined different threshold values for different merchant types, countries, payor accounts, etc.
  • As indicated further above, the number of intermediate values determined by the first authorization engine 18 may vary for different embodiments. In one embodiment, the first authorization engine 18 may only determine a probability for the specific value of each transaction attribute of interest in the requested current transaction. In another embodiment, the first authorization engine 18 may only determine a relative entropy in relation to each transaction attribute of interest. In a preferred embodiment, however, both types of intermediate value are determined by the first authorization engine 18 in relation to each transaction attribute of interest to allow for a higher quality of the score determined by the first authorization engine 18.

Claims (18)

1. A transaction authorization system, comprising:
an authorization engine configured to perform an analysis in relation to a received request for authorization of a current electronic payment transaction and generate an authorization output based on the analysis,
a database storing a plurality of transaction records for past electronic payment transactions,
wherein the authorization engine is configured to:
access the database to determine one or more distribution functions based on at least some of the stored transaction records,
determine one or more intermediate values in relation to the received authorization request based on the one or more distribution functions,
determine a conditional probability in relation to the one or more intermediate values based on at least some of the stored transaction records, the conditional probability indicative of a probability of a predetermined transaction result under the condition of the one or more intermediate values, and
generate the authorization output based on the determined conditional probability,
wherein the authorization engine is configured to determine one or more relative entropies in relation to the received authorization request based on the one or more first and one or more second frequency distribution functions and determine the conditional probability based on the one or more relative entropies.
2. The transaction authorization system of claim 1,
wherein the authorization engine is configured to determine one or more first frequency distribution functions in relation to each of a plurality of payor account identifiers based on stored transaction records having the respective payor account identifiers, the one or more first frequency distribution functions being indicative of the frequency distribution of one or more transaction attributes of electronic payment transactions associated with a respective payor account identifier.
3. The transaction authorization system of claim 2,
wherein the authorization engine is configured to determine one or more current transaction probabilities in relation to the received authorization request based on the one or more first frequency distribution functions and determine the conditional probability based on the one or more current transaction probabilities.
4. The transaction authorization system of claim 2,
wherein authorization engine is configured to determine one or more second frequency distribution functions in relation to each of one or more groups of payor account identifiers based on stored transaction records having the respective payor account identifiers, the one or more second frequency distribution functions being indicative of the frequency distribution of one or more transaction attributes of electronic payment transactions associated with a respective group of payor account identifiers.
5. (canceled)
6. The transaction authorization system of claim 2,
wherein the one or more transaction attributes relate to at least one of the following:
a transaction amount, a transaction time, a transaction date, a difference between the times of two successive transactions, a difference between the dates of two successive transactions, a geographical location of a terminal from which a transaction authorization request was received, and an identification code of such a terminal.
7. The transaction authorization system of claim 1,
wherein the authorization engine is configured to generate the authorization output based on the result of a comparison of the conditional probability with one or more predetermined threshold values.
8. The transaction authorization system of claim 1,
further comprising a host server configured to receive authorization requests for first-type electronic payment transactions and second-type electronic payment transactions, forward the authorization requests for first-type payment transactions to the authorization engine, and route the authorization requests for second-type payment transactions to a remote further transaction authorization system, wherein the host server is coupled to the database and is configured to register a transaction record for every requested first-type payment transaction and every requested second-type payment transaction in the database.
9. A transaction authorization method, comprising:
receiving a request for authorization of a current electronic payment transaction,
providing a database storing a plurality of transaction records for past electronic payment transactions,
accessing the database to determine one or more distribution functions based on at least some of the stored transaction records,
determining one or more intermediate values in relation to the received authorization request based on the one or more distribution functions,
determining a conditional probability in relation to the one or more intermediate values based on at least some of the stored transaction records, the conditional probability indicative of a probability of a predetermined transaction results under the condition of the one or more intermediate values,
generating an authorization output based on the determined conditional probability, and
determining one or more relative entropies in relation to the received authorization request based on the one or more first and one or more second frequency distribution functions and determining the conditional probability based on the one or more relative entropies.
10. The transaction authorization method of claim 9, comprising:
determining one or more first frequency distribution functions in relation to each of a plurality of payor account identifiers based on stored transaction records having the respective payor account identifiers, the one or more first frequency distribution functions being indicative of the frequency distribution of one or more transaction attributes of electronic payment transactions associated with a respective payor account identifier.
11. The transaction authorization method of claim 10, comprising:
determining one or more current transaction probabilities in relation to the received authorization request based on the one or more first frequency distribution functions and determining the conditional probability based on the one or more current transaction probabilities.
12. The transaction authorization method of claim 10, comprising:
determining one or more second frequency distribution functions in relation to each of one or more groups of payor account identifiers based on stored transaction records having the respective payor account identifiers, the one or more second frequency distribution functions being indicative of the frequency distribution of one or more transaction attributes of electronic payment transactions associated with a respective group of payor account identifiers.
13. (canceled)
14. The transaction authorization method of claim 10,
wherein the one or more transaction attributes relate to at least one of the following:
a transaction amount, a transaction time, a transaction date, a difference between the times of two successive transactions, a difference between the dates of two successive transactions, a geographical location of a terminal from which a transaction authorization request was received, and an identification code of such a terminal.
15. The transaction authorization method of claim, comprising:
generating the authorization output based on the result of a comparison of the conditional probability with one or more predetermined threshold values.
16. The transaction authorization method of claim, comprising:
receiving, at a host server, authorization requests for first-type electronic payment transactions and second-type electronic payment transactions, forwarding the authorization requests for first-type payment transactions to the authorization engine, routing the authorization requests for second-type payment transactions to a remote further transaction authorization system, and registering, by the host server, a transaction record for every requested first-type payment transaction and every requested second-type payment transaction in the database.
17. A computer-readable information storage medium, the medium storing program code means adapted to effect, when executed by a computer system, execution of a method as claimed in claim 9.
18. (canceled)
US12/174,228 2005-06-06 2008-07-16 System and method for authorizing electronic payment transactions Active 2027-04-09 US7896234B2 (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
EP05012141.7 2005-06-06
EP05012141 2005-06-06
EP20050012141 EP1732034A1 (en) 2005-06-06 2005-06-06 System and method for authorizing electronic payment transactions
US11/428,487 US7413119B2 (en) 2005-06-06 2006-07-03 System and method for authorizing electronic payment transactions
US12/174,228 US7896234B2 (en) 2005-06-06 2008-07-16 System and method for authorizing electronic payment transactions

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US12/174,228 US7896234B2 (en) 2005-06-06 2008-07-16 System and method for authorizing electronic payment transactions

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US11/428,487 Continuation US7413119B2 (en) 2005-06-06 2006-07-03 System and method for authorizing electronic payment transactions

Publications (2)

Publication Number Publication Date
US20080281733A1 true US20080281733A1 (en) 2008-11-13
US7896234B2 US7896234B2 (en) 2011-03-01

Family

ID=35033566

Family Applications (2)

Application Number Title Priority Date Filing Date
US11/428,487 Active 2026-08-31 US7413119B2 (en) 2005-06-06 2006-07-03 System and method for authorizing electronic payment transactions
US12/174,228 Active 2027-04-09 US7896234B2 (en) 2005-06-06 2008-07-16 System and method for authorizing electronic payment transactions

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US11/428,487 Active 2026-08-31 US7413119B2 (en) 2005-06-06 2006-07-03 System and method for authorizing electronic payment transactions

Country Status (2)

Country Link
US (2) US7413119B2 (en)
EP (1) EP1732034A1 (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090271306A1 (en) * 2008-04-29 2009-10-29 Iovation Inc. System and Method to Facilitate Secure Payment of Digital Transactions
US20100145810A1 (en) * 2008-12-06 2010-06-10 Stacy Pourfallah Automated substantiation of product level specific account payments
US20110006113A1 (en) * 2009-07-09 2011-01-13 Kenichi Uchikura Authorization verification system
US20110079643A1 (en) * 2009-10-05 2011-04-07 Stacy Pourfallah Prescription sample transaction payment card
US20110184861A1 (en) * 2002-12-31 2011-07-28 American Express Travel Related Services Company, Inc. Method and system for implementing and managing an enterprise identity management for distributed security in a computer system
US8413905B2 (en) 2009-10-05 2013-04-09 Visa U.S.A. Inc. Portable prescription transaction payment device
US8417543B2 (en) 2006-07-31 2013-04-09 Visa U.S.A. Inc. Electronic payment delivery service
US20140058854A1 (en) * 2007-12-07 2014-02-27 Jpmorgan Chase Bank, N.A. Mobile Fraud Prevention System and Method
US8676684B2 (en) 2010-04-12 2014-03-18 Iovation Inc. System and method for evaluating risk in fraud prevention
US8688581B2 (en) 2005-01-04 2014-04-01 Visa U.S.A. Inc. Product level payment network acquired transaction authorization
US8751815B2 (en) 2006-10-25 2014-06-10 Iovation Inc. Creating and verifying globally unique device-specific identifiers
US8776225B2 (en) 2004-06-14 2014-07-08 Iovation, Inc. Network security and fraud detection system and method
US20140279556A1 (en) * 2013-03-12 2014-09-18 Seth Priebatsch Distributed authenticity verification for consumer payment transactions
US8939356B2 (en) 2009-06-08 2015-01-27 Visa International Service Association Portable prescription payment device management platform apparautses, methods and systems
US9530289B2 (en) 2013-07-11 2016-12-27 Scvngr, Inc. Payment processing with automatic no-touch mode selection
US9589266B2 (en) 2011-04-01 2017-03-07 Visa International Service Association Restricted-use account payment administration apparatuses, methods and systems
US9760871B1 (en) 2011-04-01 2017-09-12 Visa International Service Association Event-triggered business-to-business electronic payment processing apparatuses, methods and systems

Families Citing this family (113)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002088874A2 (en) * 2001-04-27 2002-11-07 Massachusetts Institute Of Technology Method and system for micropayment transactions
EP1732034A1 (en) * 2005-06-06 2006-12-13 First Data Corporation System and method for authorizing electronic payment transactions
US7962495B2 (en) 2006-11-20 2011-06-14 Palantir Technologies, Inc. Creating data in a data store using a dynamic ontology
US8930331B2 (en) 2007-02-21 2015-01-06 Palantir Technologies Providing unique views of data based on changes or rules
US8086533B1 (en) * 2007-03-23 2011-12-27 Amdocs Development Limited-Guernsey Branch System, method, and computer program product for payment authorization based on a variable payment authorization score
JP5156254B2 (en) * 2007-04-17 2013-03-06 楽天株式会社 The information processing apparatus, information processing method, and an information processing program
US8768778B2 (en) 2007-06-29 2014-07-01 Boku, Inc. Effecting an electronic payment
US8554719B2 (en) 2007-10-18 2013-10-08 Palantir Technologies, Inc. Resolving database entity information
GB2457445A (en) * 2008-02-12 2009-08-19 Vidicom Ltd Verifying payment transactions
GB0809383D0 (en) 2008-05-23 2008-07-02 Vidicom Ltd Customer to supplier funds transfer
AU2009285780B2 (en) * 2008-08-27 2015-07-02 Cardinalcommerce Corporation Intelligent server routing
US8752042B2 (en) 2008-08-27 2014-06-10 Cardinalcommerce Corporation Intelligent server routing
US8429194B2 (en) 2008-09-15 2013-04-23 Palantir Technologies, Inc. Document-based workflows
US9652761B2 (en) 2009-01-23 2017-05-16 Boku, Inc. Systems and methods to facilitate electronic payments
US8548426B2 (en) * 2009-02-20 2013-10-01 Boku, Inc. Systems and methods to approve electronic payments
US9990623B2 (en) * 2009-03-02 2018-06-05 Boku, Inc. Systems and methods to provide information
US8700530B2 (en) 2009-03-10 2014-04-15 Boku, Inc. Systems and methods to process user initiated transactions
US20100274691A1 (en) * 2009-04-28 2010-10-28 Ayman Hammad Multi alerts based system
US20100274653A1 (en) * 2009-04-28 2010-10-28 Ayman Hammad Notification social networking
US20100306015A1 (en) * 2009-05-29 2010-12-02 Boku, Inc. Systems and Methods to Schedule Transactions
US9595028B2 (en) * 2009-06-08 2017-03-14 Boku, Inc. Systems and methods to add funds to an account via a mobile communication device
US8510263B2 (en) * 2009-06-15 2013-08-13 Verisign, Inc. Method and system for auditing transaction data from database operations
US9697510B2 (en) * 2009-07-23 2017-07-04 Boku, Inc. Systems and methods to facilitate retail transactions
US9519892B2 (en) * 2009-08-04 2016-12-13 Boku, Inc. Systems and methods to accelerate transactions
US20110125610A1 (en) * 2009-11-20 2011-05-26 Boku, Inc. Systems and Methods to Automate the Initiation of Transactions via Mobile Devices
US20120109802A1 (en) * 2010-10-29 2012-05-03 Bank Of America Corporation Verifying identity through use of an integrated risk assessment and management system
US20110185406A1 (en) * 2010-01-26 2011-07-28 Boku, Inc. Systems and Methods to Authenticate Users
US20110213671A1 (en) * 2010-02-26 2011-09-01 Boku, Inc. Systems and Methods to Process Payments
US20110217994A1 (en) * 2010-03-03 2011-09-08 Boku, Inc. Systems and Methods to Automate Transactions via Mobile Devices
US8583504B2 (en) * 2010-03-29 2013-11-12 Boku, Inc. Systems and methods to provide offers on mobile devices
US20110238483A1 (en) * 2010-03-29 2011-09-29 Boku, Inc. Systems and Methods to Distribute and Redeem Offers
US8364642B1 (en) 2010-07-07 2013-01-29 Palantir Technologies, Inc. Managing disconnected investigations
CA2808093A1 (en) 2010-08-11 2012-02-16 Boku, Inc. Systems and methods to identify carrier information for transmission of premium messages
US8699994B2 (en) 2010-12-16 2014-04-15 Boku, Inc. Systems and methods to selectively authenticate via mobile communications
US8583496B2 (en) 2010-12-29 2013-11-12 Boku, Inc. Systems and methods to process payments via account identifiers and phone numbers
US8700524B2 (en) 2011-01-04 2014-04-15 Boku, Inc. Systems and methods to restrict payment transactions
US8688749B1 (en) 2011-03-31 2014-04-01 Palantir Technologies, Inc. Cross-ontology multi-master replication
US8543087B2 (en) 2011-04-26 2013-09-24 Boku, Inc. Systems and methods to facilitate repeated purchases
US9191217B2 (en) 2011-04-28 2015-11-17 Boku, Inc. Systems and methods to process donations
US9830622B1 (en) 2011-04-28 2017-11-28 Boku, Inc. Systems and methods to process donations
US8732574B2 (en) 2011-08-25 2014-05-20 Palantir Technologies, Inc. System and method for parameterizing documents for automatic workflow generation
US8782004B2 (en) 2012-01-23 2014-07-15 Palantir Technologies, Inc. Cross-ACL multi-master replication
US9348677B2 (en) 2012-10-22 2016-05-24 Palantir Technologies Inc. System and method for batch evaluation programs
US9081975B2 (en) 2012-10-22 2015-07-14 Palantir Technologies, Inc. Sharing information between nexuses that use different classification schemes for information access control
US9501761B2 (en) 2012-11-05 2016-11-22 Palantir Technologies, Inc. System and method for sharing investigation results
US10140664B2 (en) * 2013-03-14 2018-11-27 Palantir Technologies Inc. Resolving similar entities from a transaction database
US8924388B2 (en) 2013-03-15 2014-12-30 Palantir Technologies Inc. Computer-implemented systems and methods for comparing and associating objects
US8855999B1 (en) 2013-03-15 2014-10-07 Palantir Technologies Inc. Method and system for generating a parser and parsing complex data
US10275778B1 (en) 2013-03-15 2019-04-30 Palantir Technologies Inc. Systems and user interfaces for dynamic and interactive investigation based on automatic malfeasance clustering of related data in various data structures
US8868486B2 (en) 2013-03-15 2014-10-21 Palantir Technologies Inc. Time-sensitive cube
US8903717B2 (en) 2013-03-15 2014-12-02 Palantir Technologies Inc. Method and system for generating a parser and parsing complex data
US8799799B1 (en) 2013-05-07 2014-08-05 Palantir Technologies Inc. Interactive geospatial map
US8601326B1 (en) 2013-07-05 2013-12-03 Palantir Technologies, Inc. Data quality monitors
US9785317B2 (en) 2013-09-24 2017-10-10 Palantir Technologies Inc. Presentation and analysis of user interaction data
US8938686B1 (en) 2013-10-03 2015-01-20 Palantir Technologies Inc. Systems and methods for analyzing performance of an entity
US8812960B1 (en) 2013-10-07 2014-08-19 Palantir Technologies Inc. Cohort-based presentation of user interaction data
US9105000B1 (en) 2013-12-10 2015-08-11 Palantir Technologies Inc. Aggregating data from a plurality of data sources
US9734217B2 (en) 2013-12-16 2017-08-15 Palantir Technologies Inc. Methods and systems for analyzing entity performance
US10356032B2 (en) 2013-12-26 2019-07-16 Palantir Technologies Inc. System and method for detecting confidential information emails
US8832832B1 (en) 2014-01-03 2014-09-09 Palantir Technologies Inc. IP reputation
US8935201B1 (en) 2014-03-18 2015-01-13 Palantir Technologies Inc. Determining and extracting changed data from a data source
US9619557B2 (en) 2014-06-30 2017-04-11 Palantir Technologies, Inc. Systems and methods for key phrase characterization of documents
US9535974B1 (en) 2014-06-30 2017-01-03 Palantir Technologies Inc. Systems and methods for identifying key phrase clusters within documents
US9129219B1 (en) 2014-06-30 2015-09-08 Palantir Technologies, Inc. Crime risk forecasting
US9256664B2 (en) 2014-07-03 2016-02-09 Palantir Technologies Inc. System and method for news events detection and visualization
US9454281B2 (en) 2014-09-03 2016-09-27 Palantir Technologies Inc. System for providing dynamic linked panels in user interface
US9390086B2 (en) 2014-09-11 2016-07-12 Palantir Technologies Inc. Classification system with methodology for efficient verification
JP6005113B2 (en) * 2014-09-19 2016-10-12 ヤフー株式会社 Settlement management system, settlement management methods and settlement management program
US9767172B2 (en) 2014-10-03 2017-09-19 Palantir Technologies Inc. Data aggregation and analysis system
US9501851B2 (en) 2014-10-03 2016-11-22 Palantir Technologies Inc. Time-series analysis system
US9984133B2 (en) 2014-10-16 2018-05-29 Palantir Technologies Inc. Schematic and database linking system
US9229952B1 (en) 2014-11-05 2016-01-05 Palantir Technologies, Inc. History preserving data pipeline system and method
US9043894B1 (en) 2014-11-06 2015-05-26 Palantir Technologies Inc. Malicious software detection in a computing system
US20160148092A1 (en) * 2014-11-20 2016-05-26 Mastercard International Incorporated Systems and methods for determining activity level at a merchant location by leveraging real-time transaction data
EP3032441A2 (en) 2014-12-08 2016-06-15 Palantir Technologies, Inc. Distributed acoustic sensing data analysis system
US9483546B2 (en) 2014-12-15 2016-11-01 Palantir Technologies Inc. System and method for associating related records to common entities across multiple lists
US9348920B1 (en) 2014-12-22 2016-05-24 Palantir Technologies Inc. Concept indexing among database of documents using machine learning techniques
US9335911B1 (en) 2014-12-29 2016-05-10 Palantir Technologies Inc. Interactive user interface for dynamic data analysis exploration and query processing
US9817563B1 (en) 2014-12-29 2017-11-14 Palantir Technologies Inc. System and method of generating data points from one or more data stores of data items for chart creation and manipulation
US9727560B2 (en) 2015-02-25 2017-08-08 Palantir Technologies Inc. Systems and methods for organizing and identifying documents via hierarchies and dimensions of tags
EP3070622A1 (en) 2015-03-16 2016-09-21 Palantir Technologies, Inc. Interactive user interfaces for location-based data analysis
US9886467B2 (en) 2015-03-19 2018-02-06 Plantir Technologies Inc. System and method for comparing and visualizing data entities and data entity series
US10103953B1 (en) 2015-05-12 2018-10-16 Palantir Technologies Inc. Methods and systems for analyzing entity performance
US9392008B1 (en) 2015-07-23 2016-07-12 Palantir Technologies Inc. Systems and methods for identifying information related to payment card breaches
US9996595B2 (en) 2015-08-03 2018-06-12 Palantir Technologies, Inc. Providing full data provenance visualization for versioned datasets
US10127289B2 (en) 2015-08-19 2018-11-13 Palantir Technologies Inc. Systems and methods for automatic clustering and canonical designation of related data in various data structures
US9671776B1 (en) 2015-08-20 2017-06-06 Palantir Technologies Inc. Quantifying, tracking, and anticipating risk at a manufacturing facility, taking deviation type and staffing conditions into account
US9485265B1 (en) 2015-08-28 2016-11-01 Palantir Technologies Inc. Malicious activity detection system capable of efficiently processing data accessed from databases and generating alerts for display in interactive user interfaces
US9984428B2 (en) 2015-09-04 2018-05-29 Palantir Technologies Inc. Systems and methods for structuring data from unstructured electronic data files
US9639580B1 (en) 2015-09-04 2017-05-02 Palantir Technologies, Inc. Computer-implemented systems and methods for data management and visualization
US9576015B1 (en) 2015-09-09 2017-02-21 Palantir Technologies, Inc. Domain-specific language for dataset transformations
US9424669B1 (en) 2015-10-21 2016-08-23 Palantir Technologies Inc. Generating graphical representations of event participation flow
US10223429B2 (en) 2015-12-01 2019-03-05 Palantir Technologies Inc. Entity data attribution using disparate data sets
US9760556B1 (en) 2015-12-11 2017-09-12 Palantir Technologies Inc. Systems and methods for annotating and linking electronic documents
US9514414B1 (en) 2015-12-11 2016-12-06 Palantir Technologies Inc. Systems and methods for identifying and categorizing electronic documents through machine learning
US10114884B1 (en) 2015-12-16 2018-10-30 Palantir Technologies Inc. Systems and methods for attribute analysis of one or more databases
US10089289B2 (en) 2015-12-29 2018-10-02 Palantir Technologies Inc. Real-time document annotation
US9996236B1 (en) 2015-12-29 2018-06-12 Palantir Technologies Inc. Simplified frontend processing and visualization of large datasets
US9792020B1 (en) 2015-12-30 2017-10-17 Palantir Technologies Inc. Systems for collecting, aggregating, and storing data, generating interactive user interfaces for analyzing data, and generating alerts based upon collected data
US10248722B2 (en) 2016-02-22 2019-04-02 Palantir Technologies Inc. Multi-language support for dynamic ontology
US9652139B1 (en) 2016-04-06 2017-05-16 Palantir Technologies Inc. Graphical representation of an output
US10068199B1 (en) 2016-05-13 2018-09-04 Palantir Technologies Inc. System to catalogue tracking data
US10324609B2 (en) 2016-07-21 2019-06-18 Palantir Technologies Inc. System for providing dynamic linked panels in user interface
US10133588B1 (en) 2016-10-20 2018-11-20 Palantir Technologies Inc. Transforming instructions for collaborative updates
US10318630B1 (en) 2016-11-21 2019-06-11 Palantir Technologies Inc. Analysis of large bodies of textual data
US9842338B1 (en) 2016-11-21 2017-12-12 Palantir Technologies Inc. System to identify vulnerable card readers
US9886525B1 (en) 2016-12-16 2018-02-06 Palantir Technologies Inc. Data item aggregate probability analysis system
US10044836B2 (en) 2016-12-19 2018-08-07 Palantir Technologies Inc. Conducting investigations under limited connectivity
US10249033B1 (en) 2016-12-20 2019-04-02 Palantir Technologies Inc. User interface for managing defects
US10216811B1 (en) 2017-01-05 2019-02-26 Palantir Technologies Inc. Collaborating using different object models
US10133621B1 (en) 2017-01-18 2018-11-20 Palantir Technologies Inc. Data analysis system to facilitate investigative process
US10133783B2 (en) 2017-04-11 2018-11-20 Palantir Technologies Inc. Systems and methods for constraint driven database searching
US10235533B1 (en) 2017-12-01 2019-03-19 Palantir Technologies Inc. Multi-user access controls in electronic simultaneously editable document editor

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7413119B2 (en) * 2005-06-06 2008-08-19 First Data Corporation System and method for authorizing electronic payment transactions

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5679938A (en) * 1994-12-02 1997-10-21 Telecheck International, Inc. Methods and systems for interactive check authorizations
US6636833B1 (en) 1998-03-25 2003-10-21 Obis Patents Ltd. Credit card system and method
US6254000B1 (en) * 1998-11-13 2001-07-03 First Data Corporation System and method for providing a card transaction authorization fraud warning
US6862559B1 (en) * 1999-07-23 2005-03-01 Xerox Corporation Methods and apparatuses for measuring diversity in combinatorial structures
US6516056B1 (en) 2000-01-07 2003-02-04 Vesta Corporation Fraud prevention system and method
US20020091646A1 (en) 2000-11-03 2002-07-11 Lake Lawrence L. Method and system for verifying the identity of on-line credit card purchasers through a proxy transaction
US7865427B2 (en) * 2001-05-30 2011-01-04 Cybersource Corporation Method and apparatus for evaluating fraud risk in an electronic commerce transaction
US20030091646A1 (en) * 2001-06-21 2003-05-15 Shokyu Gen Medical materials sterilized by radiation and their ways in use
US7809650B2 (en) * 2003-07-01 2010-10-05 Visa U.S.A. Inc. Method and system for providing risk information in connection with transaction processing

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7413119B2 (en) * 2005-06-06 2008-08-19 First Data Corporation System and method for authorizing electronic payment transactions

Cited By (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110184861A1 (en) * 2002-12-31 2011-07-28 American Express Travel Related Services Company, Inc. Method and system for implementing and managing an enterprise identity management for distributed security in a computer system
US20110202565A1 (en) * 2002-12-31 2011-08-18 American Express Travel Related Services Company, Inc. Method and system for implementing and managing an enterprise identity management for distributed security in a computer system
US8776225B2 (en) 2004-06-14 2014-07-08 Iovation, Inc. Network security and fraud detection system and method
US9203837B2 (en) 2004-06-14 2015-12-01 Iovation, Inc. Network security and fraud detection system and method
US9118646B2 (en) 2004-06-14 2015-08-25 Iovation, Inc. Network security and fraud detection system and method
US8688581B2 (en) 2005-01-04 2014-04-01 Visa U.S.A. Inc. Product level payment network acquired transaction authorization
US8417543B2 (en) 2006-07-31 2013-04-09 Visa U.S.A. Inc. Electronic payment delivery service
US8751815B2 (en) 2006-10-25 2014-06-10 Iovation Inc. Creating and verifying globally unique device-specific identifiers
US20140058854A1 (en) * 2007-12-07 2014-02-27 Jpmorgan Chase Bank, N.A. Mobile Fraud Prevention System and Method
US9779403B2 (en) * 2007-12-07 2017-10-03 Jpmorgan Chase Bank, N.A. Mobile fraud prevention system and method
US20090271306A1 (en) * 2008-04-29 2009-10-29 Iovation Inc. System and Method to Facilitate Secure Payment of Digital Transactions
EP2359324A2 (en) * 2008-12-06 2011-08-24 Visa U.S.A. Inc. Automated substantiation of product level specific account payments
WO2010065910A3 (en) * 2008-12-06 2010-08-19 Visa U.S.A. Inc. Automated substantiation of product level specific account payments
US20100145810A1 (en) * 2008-12-06 2010-06-10 Stacy Pourfallah Automated substantiation of product level specific account payments
EP2359324A4 (en) * 2008-12-06 2012-12-26 Visa Usa Inc Automated substantiation of product level specific account payments
US8939356B2 (en) 2009-06-08 2015-01-27 Visa International Service Association Portable prescription payment device management platform apparautses, methods and systems
US8167200B2 (en) 2009-07-09 2012-05-01 Kenichi Uchikura Authorization verification system
US20110006113A1 (en) * 2009-07-09 2011-01-13 Kenichi Uchikura Authorization verification system
WO2011005263A1 (en) * 2009-07-09 2011-01-13 Kenichi Uchikura Authorization verification system
US8413905B2 (en) 2009-10-05 2013-04-09 Visa U.S.A. Inc. Portable prescription transaction payment device
US20110079643A1 (en) * 2009-10-05 2011-04-07 Stacy Pourfallah Prescription sample transaction payment card
US8676684B2 (en) 2010-04-12 2014-03-18 Iovation Inc. System and method for evaluating risk in fraud prevention
US9589266B2 (en) 2011-04-01 2017-03-07 Visa International Service Association Restricted-use account payment administration apparatuses, methods and systems
US9760871B1 (en) 2011-04-01 2017-09-12 Visa International Service Association Event-triggered business-to-business electronic payment processing apparatuses, methods and systems
US10115087B2 (en) 2011-04-01 2018-10-30 Visa International Service Association Event-triggered business-to-business electronic payment processing apparatuses, methods and systems
US10169760B2 (en) 2011-04-01 2019-01-01 Visa International Service Association Restricted-use account payment administration apparatuses, methods and systems
US20140279556A1 (en) * 2013-03-12 2014-09-18 Seth Priebatsch Distributed authenticity verification for consumer payment transactions
US9530289B2 (en) 2013-07-11 2016-12-27 Scvngr, Inc. Payment processing with automatic no-touch mode selection

Also Published As

Publication number Publication date
US20070000999A1 (en) 2007-01-04
EP1732034A1 (en) 2006-12-13
US7413119B2 (en) 2008-08-19
US7896234B2 (en) 2011-03-01

Similar Documents

Publication Publication Date Title
US5896298A (en) System and method for providing central notification of issued items
CN102812488B (en) Trading system to reduce fraud
US8082210B2 (en) Authentication for online money transfers
US8639629B1 (en) System and method for accessing an online user account registry via a thin-client unique user code
US8256666B2 (en) Processing transactions of different payment devices of the same issuer account
US8195565B2 (en) Systems and methods for point of interaction based policy routing of transactions
US9292852B2 (en) System and method for applying stored value to a financial transaction
US8090648B2 (en) Fraud detection based on efficient frequent-behavior sorted lists
AU2007281893B2 (en) Money transfer transactions via pre-paid wireless communication devices
US8285639B2 (en) Location based authentication system
EP0709811B1 (en) Transaction terminal
US6070141A (en) System and method of assessing the quality of an identification transaction using an identificaion quality score
RU2427917C2 (en) Device, system and method to reduce time of interaction in contactless transaction
US8099368B2 (en) Intermediary service and method for processing financial transaction data with mobile device confirmation
US20070233599A1 (en) Systems and Methods for Hold Periods Based Upon Risk Analysis
US9123044B2 (en) Generation systems and methods for transaction identifiers having biometric keys associated therewith
US20110047076A1 (en) Alias reputation interaction system
US20120311151A1 (en) Systems and methods for establishing and enforcing user exclusion criteria across multiple websites
US8380629B2 (en) Seeding challenges for payment transactions
CA2436319C (en) Payment validation network
US20130018796A1 (en) Multi-Channel Data Driven, Real-Time Anti-Money Laundering System For Electronic Payment Cards
US20070168265A1 (en) Method, transaction card or identification system for transaction network comprising proprietary card network, eft, ach, or atm, and global account for end user automatic or manual presetting or adjustment of multiple account balance payoff, billing cycles, budget control and overdraft or fraud protection for at least one transaction debit using at least two related financial accounts to maximize both end user control and global account issuer fees from end users and merchants, including account, transaction and interchange fees
US20090319425A1 (en) Mobile Person-to-Person Payment System
US8370265B2 (en) System and method for managing status of a payment instrument
KR101502460B1 (en) Consumer Authentication System and Method

Legal Events

Date Code Title Description
AS Assignment

Owner name: FIRST DATA CORPORATION, COLORADO

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KUBO, TAKAYUKI;ALBRECHT, NORBERT;REEL/FRAME:021246/0110

Effective date: 20060409

AS Assignment

Owner name: WELLS FARGO BANK, NATIONAL ASSOCIATION, AS COLLATE

Free format text: SECURITY AGREEMENT;ASSIGNORS:DW HOLDINGS, INC.;FIRST DATA RESOURCES, INC. (K/N/A FIRST DATA RESOURCES, LLC);FUNDSXPRESS FINANCIAL NETWORKS, INC.;AND OTHERS;REEL/FRAME:025368/0183

Effective date: 20100820

AS Assignment

Owner name: WELLS FARGO BANK, NATIONAL ASSOCIATION, AS COLLATE

Free format text: SECURITY AGREEMENT;ASSIGNORS:DW HOLDINGS, INC.;FIRST DATA RESOURCES, LLC;FUNDSXPRESS FINANCIAL NETWORKS, INC.;AND OTHERS;REEL/FRAME:025719/0590

Effective date: 20101217

STCF Information on status: patent grant

Free format text: PATENTED CASE

AS Assignment

Owner name: WELLS FARGO BANK, NATIONAL ASSOCIATION, AS COLLATE

Free format text: SECURITY AGREEMENT;ASSIGNOR:FIRST DATA CORPORATION;REEL/FRAME:026578/0186

Effective date: 20110712

AS Assignment

Owner name: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, NEW YORK

Free format text: SECURITY AGREEMENT;ASSIGNORS:FIRST DATA CORPORATION;CLOVER NETWORKS, INC.;MONEY NETWORK FINANCIAL, LLC;REEL/FRAME:030080/0531

Effective date: 20130320

FPAY Fee payment

Year of fee payment: 4

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 8